Android App Security Learning
Plus WeChat: r0ysue (Note: Into FridaFart Group)
—
Some of the links are for charge links such as
Knowledge Planet
,Little Goose Lane
, etc. Do not enter
PS: The above mobile phone, hardware, books, and other places to order (click to see more at the seller)
—
- 01.Android Environment Preparation: Google Original Mirror 8.1, TWRP, Magisk root
- 02. An article takes you to the heart of frida (based on Android 8.1) (code updated: 20200512, see folder compression package)
- 01.FRIDA Script Series (I) Getting Started: dump Bluetooth Interfaces and Instances on Android 8.1
- 02.FRIDA Script Series (II) Growth: Dynamic and Static Combined Reverse WhatsApp
- 03.FRIDA Script Series (III) Psychic: Baidu AI "Tuning" TikTok AI
- 04.FRIDA Script Series (IV) Update: Major Updates to Several Major Mechanisms
- 01.FRIDA-API usages: rpc, Process, Module, Memory usage and examples
- 02.FRIDA-API Usages: Java, Interceptor, NativePointer (Function/Callback) Usage and Examples
- 03.Frida Java Hook Details (Android9): Code and Samples (top)
- 04.Frida Java Hook Details (Android9): Code and Examples (below)
- 01. Functional FRIDA Advanced: Memory Roaming, 'hook anywhere', Packet Grab
- 02. Practical FRIDA Advancements: Unpacking, Automating, Practical Issues Collection
-
- Practical FRIDA Advancements: Active Invocation, CipherStar
—
- 2020 Android Source Code Compilation Guide and 'FART' Off-Shell Google Full Device Image Launch
- FART source parsing and compilation mirroring support to Pixel2(xl) (link:https://pan.baidu.com/s/1zAYliYbkagdUUsykww_L4g extract:vv5u)
- 'XPOSED'Change One: Get Features
'Kali Linux' virtual machine download seed in 'FART/' folder
- Confrontation from High Latitude (1): Custom ART interpreter stripping all first and second generation shells (Attachment)
- Confrontation from High Latitude (2): Magic Modified XPOSED Over Frame Detection (top)
- Confrontation from High Latitude (3): Magic Alterations XPOSED Over Frame Detection (below) (Annex 1, [Annex 2] (https://t.zsxq.com/BqFAIEu))
- Confrontation from Galway (4): Custom Android Kernel Over Anti-Debug(Attachment: Link: https://pan.baidu.com/s/1zAYliYbkagdUUsykww_L4g Extract Code: vv5u])
- Confrontation from High Latitude (5): Replace the Android kernel and unpack Linux commands and environments (attachment)
- Environment Configuration for Reverse Android App Lesson 1
- Introduction to the Reverse Magic frida, Second Reverse Course on Android Apps
- Top Quality Plus Android App Reverse Course 3 frida Injection Okhttp Scratches Top
- frida Injection into Okhttp Package Chapter 4 Reverse Course on Android Apps
- Quality Continuous Running Bank Android App Reverse Course 5 frida Injection Okhttp Packet Capture Next
- "Summary of Common Java Layer Anti-Debugging Techniques for root Detection"
- "Challenging the $200 Cost of iOS Reverse Environment Without macOS Reverse iOS APP"
- "Pixel1 Replacement: OnePlus3 Phone Swipe KaliNethunter to Unpack the Full Linux Command Environment"
- "Pixel4 Parity: A Guide to OnePlus7 Brushing NetHunter (android10)"
- "Challenging Reverse iOS APP without macOS" ObjC syntax, iOS application development, and Objection Automation hook Getting Started
- Frida Prerequisites: Advanced iOS/ObjC Syntax and Its ARM Assembly Implementation
- Frida hook/invoke iOS and Memory Scratches and Black Box Calls
- 2023HW Mobile Arsenal Tools Tips Sharing
- A Standard Algorithm SO Reduction Problem
- Frida and VPN Packet Capture Configuration after Pixel4 Flushes into KernelSU